Lecture 1 - APIC 1.2.3
Lecture 1 - APIC 1.2.3
ICT3052
APIC’s Copyright Warning Notice
WARNING
This material has been reproduced and communicated to you by or on behalf of Asia Pacific
International College in accordance with section 113P of the Copyright Act 1968 (Act).
The material in this communication may be subject to copyright under the Act. Any further
reproduction or communication of this material by you may be the subject of copyright
protection under the Act.
Do not remove this notice.
Module 1: Introduction to
Forensic
Investigation
Module 1 By the end of today’s lecture, you will be able to:
• describe digital forensics
learning • understand how to prepare computer investigations and
summarise the difference between public-sector and private-
objectives sector investigations
• explain the importance of maintaining professional conduct
• explain the procedure for digital forensics investigation using
systematic approach
• identify the steps for private-sector digital investigations
• understand requirements and the software used for data
recovery workstations
• summarise how to investigate and critiquing a case.
Digital Forensics
7
Digital Forensics – NIST
definition
• The application of computer science and
investigative procedures involving the examination
of digital evidence - following proper search
authority, chain of custody, validation with
mathematics, use of validated tools, repeatability,
reporting, and possibly expert testimony.
8
What you need to be a successful digital forensics practitioner?
9
Digital Forensics Versus Other Disciplines
• ICT technologies
• Smart device architectures
• IT Networks understanding
• Cloud computing and its
working
• Law of the land and legal
requirements
10
Maintaining Professional Conduct
Professional conduct - includes ethics, An investigator must exhibit the highest Training to update skills – Investigators
morals, and standards of behavior level of professional behavior at all times should also attend trainings &
certifications to stay current with the
latest technical changes in computer
hardware and software, networking, and
forensic tools
Maintain objectivity
Maintain credibility by maintaining confidentiality
11
Digital Forensics Ken Zatyko, Digital Forensics can be explained with following
eight steps:
General Steps • Search authority (search warrant or an authorisation
letter (in case of corporate investigations))
• Chain of custody
• Imaging / hashing function
• Validated tools
• Analysis
• Repeatability (Quality Assurance)
• Reporting
• Possible expert presentation
12
Developing Digital Forensics
Resources
• You must know more than one computing platform
Example: DOS, Windows 9x, Linux, Macintosh, and current
Windows platforms
• You must also be familiar with the new technologies e.g.
smart devices, drones, cloud, social media etc
• Join as many computer user groups as you can
• Australian Information Security Association
(AISA) (https://www.aisa.org.au/ )
• Forensics Focus (forensicfocus.com)
• Magnet Forensics (magnetforensics.com) – Look for
their whitepapers under resources
• High Tech Crime Group (https://htcia.org/ )
13
Developing Digital • Exchanges information about techniques related to
computer investigation and security
Forensics Resources • User groups can be helpful
• Build a network of computer forensics experts and
other professionals
• And keep in touch through emails / OSNs
14
Developing Digital Forensics Resources
• A criminal investigation usually begins when someone finds evidence of or witnesses a crime
• Witness or victim makes an allegation to the police
• Police investigate the complainant and writes a report about the crime
• Report is then processed, and management decides when to start an investigation or log the information in a police blotter
• Digital Evidence First Responder (DEFR)
• Arrives on an incident scene, assesses the situation, and takes precautions to acquire and preserve evidence
• Digital Evidence Specialist (DES)
• Has the skill to analyze the data and determine when another specialist should be called in to assist
• Affidavit - a sworn statement of support of facts about or evidence of a crime
• Must include exhibits that support the allegation
Understanding Private-Sector Investigations
• Private-sector investigations involve private companies and lawyers who address company policy violations
and litigation disputes
• Example: wrongful termination
• Private companies strive to minimize or eliminate litigation
• Private-sector crimes can involve:
• E-mail harassment, falsification of data, gender and age discrimination, embezzlement, sabotage, and
industrial espionage
• Businesses can reduce the risk of litigation by publishing and maintaining policies that employees find easy to
read and follow
• Most important policies define rules for using the company’s computers and network which is known as an
“Acceptable use policy”
Understanding Private-Sector
Investigations
• Businesses are advised to specify an authorized requester who has the right to initiate investigations
• Examples of groups with authority
• Corporate security investigations
• Corporate ethics office
• During private investigations, you commonly search for evidence to support allegations of violations of a company’s rules or
an attack on its assets
• Three types of situations are common:
• Abuse or misuse of computing assets
• E-mail abuse
• Internet abuse
• A private-sector investigator’s job is to minimize risk to the company
Understanding Private-Sector Investigations
• The difference between personal and company system can be difficult with
cell phones, smartphones, personal notebooks, and tablet computers
• Bring your own device (BYOD) environment
• Some companies informs the employees that if you connect a personal
device to the business network, it falls under the same rules as company
property
Preparing a Digital Forensics Investigation
• Computer systems can contain information which can help law enforcement
determine:
• Chain of events leading to a crime
• Evidence that can lead to a conviction
• Law enforcement officers should follow proper procedure when acquiring the
evidence
• Digital evidence can be altered effortlessly by an overeager investigator
• A potential challenge: data on hard disk drives might be password protected
and use of forensics tools may be necessary for the investigation
An Overview of a Company Policy Violation
• An evidence custody form helps you document step by step of what was done
with the original evidence and its forensics copies
• Also called a chain-of-evidence form
• Two types
• Single-evidence form
• Lists each piece of evidence on a separate page
• Multi-evidence form
Securing Your Evidence
• Use evidence bags to secure and catalog the evidence
• Use computer safe products when collecting computer evidence
• Antistatic bags
• Antistatic pads
• Use well padded containers
• Use evidence tape to seal all openings
• CD drive bays
• Insertion slots for power supply electrical cords and USB cables
• Write your initials on tape to prove that evidence has not been tampered with
• Consider computer specific temperature and humidity ranges
• Make sure that the temperature is suitable when transporting the evidence.
Taking a Systematic
Approach
Steps for problem solving
• Make an initial assessment about the type of
case you are investigating
• Determine a preliminary design or approach
to the case
• Create a detailed checklist
• Determine the resources you need
• Obtain and copy an evidence drive
• Identify the risks
• Mitigate or minimize the risks
• Test the design
• Analyze and recover the digital evidence
• Investigate the data you recover
• Complete the case report
• Critique the case
Assessing the Case
• Most of the investigative work for termination cases in which employee abuse
of corporate assets
• Incidents that create a hostile work environment are the predominant types of
cases investigated
• Viewing pornography in the workplace
• Sending inappropriate e-mails
• Organizations must have appropriate policies in place
Interviews and Interrogations in High-Tech
Investigations
• Becoming a skilled interviewer and interrogator can take many years of experience
• Interviews are conducted to gather evidence or information from the suspects.
• Interrogation
• Process of trying to get a suspect to confess
• Digital Investigator is responsible for writing down the questions to ask for the investigator.
• Tips for a successful interview or interrogation
• Being patient throughout the session
• Repeating or rephrasing questions to zero in on specific facts from a reluctant witness or suspect
• Being tenacious
Understanding Data Recovery
Workstations and Software
• Nelson, B., Phillips, A., & Steuart, C. (2019). Guide to Computer Forensics and
Investigations (6/e). Boston, MA. Course Technology
• Brooks, C. L. (2014). CHFI Computer Hacking Forensic Investigator
Certification All-in-One Exam Guide. McGraw-Hill Publisher.